Identity-based cryptography: Difference between revisions

Content deleted Content added
Leon3289 (talk | contribs)
m Fixed a typo
Line 43:
}}</ref><ref>{{cite web|archiveurl=https://web.archive.org/web/20150627063023/http://www.bristol.ac.uk/pace/graduation/honorary-degrees/hondeg08/cocks.html|archivedate=2015-06-27|url=http://www.bristol.ac.uk/pace/graduation/honorary-degrees/hondeg08/cocks.html|publisher=University of Bristol|title=Dr Clifford Cocks CB, Honorary Doctor of Science}}</ref>
 
Closely related to various identity-based encryption schemes are identity based key agreement schemes. One of the first identity based key agreement algorithms was published in 1986, just two years after Shamir's identity based signature. The author was E. Okamoto.<ref>{{Cite journal|last=Okamoto|first=E.|date=1986|title=Proposal for identity-based key distribution systems|journal=Electronics Letters|volume=22|issue=24|pages=1283–1284|doi=10.1049/el:19860880|issn=0013-5194}}</ref> Identity Based key agreement schemes also allow for "escrow free" identity based cryptograpyhycryptography. A notable example of such an escrow free identity based key agreement is the McCullagh-Barreto's "Authenticated Key Agreement without Escrow" found in section 4 of their 2004 paper, "A New Two-Party Identity-Based Authenticated Key Agreement."<ref>{{Cite journal|last=McCullagh|first=Noel|last2=Barreto|first2=Paulo S. L. M.|date=2004|title=A New Two-Party Identity-Based Authenticated Key Agreement|url=https://eprint.iacr.org/2004/122}}</ref> A variant of this escrow free key exchange is standardized as the identity based key agreement in the Chinese identity based standard [[SM9 (cryptography standard)|SM9]].
 
==Usage==